Hereinunder attached is vauely on-topic, though spins some
unneccessarily self-important new jargon.  They don't quite seem to get
that TCPIP is fundamentally P2P from the bits up. I like the phrase
"disruptive compliance". The Net has a passive-aggressive personality?

Ken 

> Waging peace on the Internet
> 
> By Oxblood RuffinPosted: 19/04/2002 at 15:56 GMT
> Hacking is a contact sport.
> The more people who have contact with one another, the better.
> -- Shaolin Punk,
> Proxy Boss,
> Hacktivismo
> 
> There's an international book burning in progress; the surveillance cameras
> are rolling; and the water canons are drowning freedom of assembly. But it's
> not occurring anywhere that television can broadcast to the world. It's
> happening in cyberspace.
> 
> Certain countries censor access to information on the Web through DNS (Domain
> Name Service) filtering. This is a process whereby politically challenging
> information is blocked by domain address (the name that appears before the
> dot-com/net/org suffix, as in Tibet.com, etc.). State censors also filter for
> politically or socially-unacceptable ideas in e-mail. And individual privacy
> rights and community gatherings are similarly regulated.
> 
> China is often identified as the world's worst offender with its National
> Firewall and arrests for on-line activity. But the idea that the new
> Mandarins could have pulled this off by themselves is absurd. The Chinese
> have aggressively targeted the Western software giants, not only as a means
> of acquiring technical know-how, but also as agents for influencing Western
> governments to their advantage through well-established corporate networks of
> political lobbying. Everything is for sale: names, connections, and even
> national security.
> 
> Witnessing hi-tech firms dive into China is like watching the Gadarene swine.
> Already fat and greedy beyond belief, the Western technology titans are being
> herded towards the trough. And with their snouts deep in the feedbag, they
> haven't quite noticed the bacon being trimmed off their ass. It isn't so much
> a case of technology transfer as digital strip-mining. Advanced research and
> technical notes are being handed over to the Chinese without question. It
> couldn't be going better for the Communists. While bootstrapping their
> economy with the fruits of Western labor and ingenuity, they gain the tools
> to prune democracy on the vine.
> 
> But to focus on Beijing's strategy misses the larger opportunity of treating
> the spreading sickness that plagues cyberspace. Cuba not only micromanages
> its citizens' on-line experience, it has recently refused to sell them
> computers, the US trade embargo notwithstanding. Most countries indulging in
> censorship claim to be protecting their citizens from pornographic contagion.
> But the underlying motive is to prevent challenging opinions from spreading
> and coalescing through the chokehold of state-sponsored control. This
> includes banning information that ranges from political opinion, religious
> witness, "foreign" news, academic and scholarly discovery, news of human
> rights abuses all the intellectual exchange that an autocratic leadership
> considers to be destabilizing.
> 
> The capriciousness of state-sanctioned censorship is wide-ranging.
> 
> * In Zambia, the government attempted to censor information revealing their
> plans for constitutional referenda.
> 
> * In Mauritania - as in most countries - owners of cybercafis are required to
> supply government intelligence agents with copies of e-mail sent or received
> at their establishments.
> 
> * Even less draconian governments, like Malaysia, have threatened
> Web-publishers, whose only crime is to publish frequent Web site updates.
> Timely and relevant information is seen as a threat.
> 
> * South Korea's national security law forbids South Koreans from any contact
> - including contact over the Internet - with their North Korean neighbors.
> 
> The risks of accessing or disseminating information are often great.
> 
> * In Ukraine, a decapitated body found near the village of Tarachtcha is
> believed to be that of Georgiy Gongadze, founder and editor of an on-line
> newspaper critical of the authorities.
> 
> * In August 1998, an eighteen year old Turk, Emre Ersoz, was found guilty of
> "insulting the national police" in an Internet forum after participating in a
> demonstration that was violently suppressed by the police. His ISP provided
> the authorities with his address.
> 
> * Journalist Miroslav Filipovic has the dubious distinction of having been
> the first journalist accused of spying because his articles detailed the
> abuses of certain Yugoslav army units in Kosovo, and were published on the
> Internet.
> 
> These are dangerous trends for all of us. The Cult of the Dead Cow (cDc) and
> Hacktivismo are not prepared to watch the Internet's lights dim simply
> because liberal democracies are asleep at the switch.
> 
> Our fathers and grandfathers fought wars defending, among other things,- our
> right to speak and be heard. They even fought to defend unpopular opinions.
> It is the unpopular opinions that are most in need of defense. Without them,
> society would remain unchallenged and unwilling to review core beliefs. It is
> this tension between received truths and challenging ones that keeps
> societies healthy and honest. And any attempt at preventing the open exchange
> of ideas should be seen for what it is:- censorship.
> 
> For the past four years the cDc has been talking about hacktivism. It's a
> chic word, beloved among journalists and appropriators alike. Yet the meaning
> is serious. Our definition of hacktivism is, "using technology to advance
> human rights through electronic media." Many on-line activists claim to be
> hacktivists, but their tactics are often at odds with what we consider
> hacktivism to be.
> 
> >From the cDc's perspective, creation is good; destruction is bad. Hackers
> should promote the free flow of information, and causing anything to disrupt,
> prevent, or retard that flow is improper. For instance, cDc does not consider
> Web defacements or Denial of Service (DoS) attacks to be legitimate
> hacktivist actions. The former is nothing more than hi-tech vandalism, and
> the latter, an assault on free speech.
> 
> As we begin to challenge state-sponsored censorship of the Internet, we need
> to get our own house in order. There have to be accepted standards of what
> constitutes legitimate hacktivism, and what does not. And of course, none of
> this will be easy. Hacktivism is a very new field of endeavor that doesn't
> rely on mere technical expedience. We have to find new paradigms. (Tossing
> the letter E in front of a concept that has meaning in meat-space, to borrow
> a term from the Electronic Disturbance Theatre, is convenient but rarely
> meaningful). There is no such thing as electronic civil disobedience. Body
> mass and large numbers don't count as they do on the street. On the Internet,
> it's the code that counts, specifically code and programmers with conscience.
> 
> We need to start thinking in terms of disruptive compliance rather than civil
> disobedience if we want to be effective on-line. Disruptive compliance has no
> meaning outside of cyberspace. Disruptive, of course, refers to disruptive
> technology, a radically new way of doing things; compliance refers back to
> the Internet and its original intent of constructive free-flow and openness.
> 
> But what disruptively compliant, hacktivist applications shall we write, and
> more importantly, how shall we write them? There are essentially two ways of
> writing computer programs: closed/proprietary, and, open/public. In
> non-technical terms, a closed program would be like a menu item in a
> restaurant for which there was no recipe. An open program would be like a
> dish for which every ingredient, proportion, and method of preparation was
> published. Microsoft is an example of a closed, hi-tech restaurant; Linux is
> its stellar opposite, an open code cafeteria where all is laid bare. For
> years the technical community has been raging over the absolutes of closed
> over open code, an argument only slightly more boring than whether Macs are
> better than PCs.
> 
> The answer to this debate is relative; it leans closer to the user's
> requirements than to the geek community's biases. If the user wants an
> inflexible, controlled - and often insecure - experience, then closed is the
> way to go. But if the user opts for greater variety and freedom from control,
> then flexible, open code is the only option. The choices are similar,
> although not equivalent, to living in an authoritarian society as opposed to
> a free one.
> 
> Hacktivism chooses open code, mostly. Although there might be very specific
> instances where we would choose to obscure or hide code, going by the
> averages we support the same standards-based, open code methodology that
> built the Internet in the first place. It is germane that users of hacktivist
> applications sitting behind national firewalls in China and other repressive
> regimes are more worried about being caught with 'criminal software' than
> crashing their computers. End user safety is paramount in such instances, and
> if closing down code would prevent arrests, then so be it. Techno-correctness
> is a luxury of the already free.
> 
> There are numerous arguments for open code, from the rhapsodic possibilities
> of the Open Source Initiative, through the demotic juggernaut of the Free
> Software Foundation, to the debate laden pages of Slashdot with its
> creditable fetish for better security. And everyone is right in his or her
> own way. But there is another compelling reason to show the code apart from
> any technical or philosophical considerations.
> 
> The field is getting crowded.
> 
> Four years ago when cDc first started talking about hacktivism, most Internet
> users didn't know, or care, about things like state-sponsored censorship or
> privacy issues. But now the terrain has changed. Increasingly human rights
> organizations, religious and political groups, and even software developers,
> are entering the fray, each for unique reasons. It would be premature to call
> such an unlikely accretion of stakeholders a coalition. In fact, there is
> every reason to believe there are greater opportunities for carping over
> differences than leveraging common cause into shared success. But open code
> may become the glue that binds.
> 
> As more and more disparate groups attempt to loosen dictators' restraints
> over Internet, it's important to keep focused on their common goals and not
> petty differences. The more transparent and crystalline their progress
> towards collective goals becomes, the more likely it is that those objectives
> will be achieved. Open code, like the open and inclusive nature of democratic
> discourse itself, will prove to be the lingua franca of hacktivism. And
> perhaps more importantly, it will demonstrate that hacktivists are waging
> peace, not war.
> 
> In 1968 the Canadian communications guru Marshall McLuhan stated, "World War
> Three will be a guerilla information war with no division between military
> and civilian participation."
> 
> Anyone who's watched the Web after an international incident knows how true
> that statement is. Teenagers from China have attacked sites in Taiwan and the
> U.S., and vice versa, just to name one claque of combatants. And although the
> exchanges are more annoying than truly damaging, they do support McLuhan's
> theory. As the Internet erupts into battle zones, Hacktivists could become
> something akin to a United Nations peacekeeping force. But rather than being
> identified by blue helmets, they'll be recognized by the openness of their
> code and the quality and safety of their applications designed to defeat
> censorship and challenge national propaganda.
> 
> One key to countering the cadres of information censors in China and
> elsewhere is the fluidity of open code projects. Another is through
> peer-to-peer (P2P) networks. P2P has floated into public awareness mostly as
> a result of the Napster phenomenon. The 'peers' on the network are computers,
> and yet not so different from a society of peers in a democracy. Some are
> more powerful than others, but they all have common attributes. This is in
> contrast with the traditional, and more pervasive, client/server network
> mechanism, where little computers go to big ones and ask for something, be it
> a Web page, an application, or even processing power.
> 
> What is most interesting about P2P technologies is that they turn the
> much-ballyhooed Information Superhighway into a two-way street. Peers become
> both clients and servers, or 'clervers' as one naming convention has it.
> Files can be shared, a la Napster; or processes from one or many partner
> computers can be strung together to create supercomputers, among other
> things. What makes these systems attractive to hacktivist developers is they
> are difficult to shut down. Large central servers are easy to locate and take
> down. But clouds of peers in numerous arrays springing up around the
> datascape are far more problematic.
> 
> This is not to say that P2P networks are invincible. Napster got shut down.
> But when the salt is out of the shaker, it's hard to get it back in. With
> Naptser down, a legion of even more powerful file-trading devices arose to
> take its place. The fact that Napster was easy to use and didn't require a
> steep learning curve was also key to its success, other convergences
> notwithstanding. This is fundamental to anyone hoping to appeal to
> non-technical users, many of whom are partially blinded and deafened by
> national firewalls.
> 
> The target user is socially engaged, but not necessarily technically adept.
> Beneath the surface the programs can be as complicated as you please, but on
> top, from the functionality/usability perspective, the apps have to be dead
> simple and easy to use. And they have to be trustworthy.
> 
> Here is where the Napster analogy breaks down. Trust was never a paramount
> factor in using the application. It was a fun loving network developed on the
> free side of the firewall, where users' greatest worries were, a) Can I find
> what I want? b) How long will it take to download? c) Is it of good quality?
> and, d) Do I have time to download four more tunes before I go to the keg
> party?
> 
> No one ever had to ask, a) If I'm caught using this, will I be arrested? b)
> Is this application good for ten years in jail?
> 
> Having millions of students on the Napster network made sense because the
> more users there are on-line, the larger the lending library becomes. Users
> behind national firewalls cannot be so casual. Having millions of users on a
> network may be one thing, but only a fool would trust more than his or her
> closest friends when the consequences of entrapment are so high. Thus,
> carefree peer-to-peer networks are replaced by careful
> hacktivist-to-hacktivist (H2H) networks.
> 
> H2H networks are like nuclear families living in large communities. Everyone
> may live in the same area, but each family has its own home where the doors
> open, close, and lock. And occasionally, a family member will bring someone
> new home. Everyone will sit around the living room, and if all goes well, the
> guest will be shown the library, perhaps, and maybe even someone's bedroom.
> All of this is based on earned trust. H2H networks will operate along these
> lines, where families will share a space and grant permission to one another
> as well as to certain visitors. The greater the trust, the more permissions
> will be granted; and for guests visiting the home, trust will be earned
> incrementally.
> 
> This model is already in existence, more or less. Using the Internet to
> communicate between known and trusted computers is a fact of business life.
> Virtual Private Networks are used daily to communicate sensitive and
> proprietary data. The same can be done by taking elements of this model and
> marrying them to H2H network development. But saying is not doing, and even
> the best marriages can unravel and fail. It's important to realize these
> things are possible but have never been done before.
> 
> Building H2H networks is not just a matter of guessing at how particular
> technologies will respond under fire. Hackers must know what users in the
> field need. We have been telling anyone who will listen that hackers,
> grassroots activists, and other parties who care about Internet freedom and
> the growth of democracy must partner up and work together.
> 
> Hacktivismo has been working with Chinese hackers and human rights workers,
> and the collaboration has been both fruitful and energizing. Occasionally
> there are cultural conflicts, but this has nothing to do with where anyone
> was born, and everything to do with how people get things done. Hackers tend
> towards MIT professor Dave Clark's credo which states, "We reject: kings,
> presidents, and voting. We believe in: rough consensus and running code."
> Trust will come as development partners begin working more closely and
> learning that we aren't so different as we appear at the surface.
> 
> Research and development is phase one. Then comes distribution. Hackers have
> never had a problem distributing software. If you write something worth
> running, it will end up in every corner of the globe, something else we've
> learned from experience.
> 
> Leveraging existing distribution channels with those of our partners will
> ensure that users who most need liberating software will get it. Some human
> rights organizations have vast e-mail databases that will become increasingly
> invaluable for raising awareness, and in some instances, act as a
> distribution layer. Other areas of co-operation are also possible, especially
> in translations for non-English users where documentation and re-skinning
> U.I.s [the process of replacing the user interface of an application from,
> say, English to Chinese, or Arabic, etc.] will take development to ever-wider
> usefulness.
> 
> Last, although certainly not least, we need to acknowledge the Chinese
> government for their unwitting contributions to Hacktivismo's work. After
> reverse engineering some of their fundamental technologies we've discovered a
> few cracks where the light might shine through. But it does raise the
> question: why are we put in the position of doing this work? With billions of
> dollars in government budgets at their disposal, when are the world's liberal
> democracies going to put some of their resources into opening up the
> Internet? We know they don't care about human rights policy when it conflicts
> with jobs at home; but what about international security? As Beijing
> continues to play the patriotism card domestically, a more open Internet
> could diffuse traditional xenophobia through greater one-on-one interaction
> on-line.
> 
> But until Western governments become engaged, the main challenge for hackers
> is to keep focused on the goal of liberating the Internet. We realize that,
> but for the grace of God, we could be sitting on the other side of the
> firewall. It's a sentiment that is being picked up, although it would be a
> lie to say that thousands of hackers want to get into the game.
> 
> Still, enough are beginning to take up this cause that we should be able to
> see results, if new partnerships hold. There's a new generation of freedom
> fighters, sitting behind computers, who believe that it can be done. .
> 
> Related Links
> The Hacktivismo Declaration
> Reporters Without Frontiers
> The Free Software Foundation
> The Open Source Initiative
> 
> About the cDc
> Based in Lubbock, Texas, the Cult of the Dead Cow (cDc) was founded in 1984
> and is the most influential group of hackers on the Internet. The cDc is
> dedicated to protecting the online privacy rights of all Internet users. Its
> mission is to eliminate the abuse of Internet privacy that is rampant in the
> United States and throughout the world. For more information on the cDc,
> please visit www.cultdeadcow.com
> 
> About Hacktivismo
> Hacktivismo is a special group within the cDc committed to developing
> technologies in support of the highest standards of human rights. It is
> comprised of hackers, human rights workers, and artists from North America,
> Europe, Israel, Taiwan, and the People's Republic of China. For more
> information, please visit www.hacktivismo.com
> 
> ===============================================
> Information on how to subscribe and unsubscribe to the cyber-rights-UK
> mailing list is at <http://www.cyber-rights.org/mailing.htm>.
> ===============================================

Reply via email to